Wyse Technology C90LE Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Wyse Technology C90LE an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Wyse Technology C90LE, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Wyse Technology C90LE die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Wyse Technology C90LE. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Wyse Technology C90LE sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Wyse Technology C90LE
- Den Namen des Produzenten und das Produktionsjahr des Geräts Wyse Technology C90LE
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Wyse Technology C90LE
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Wyse Technology C90LE zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Wyse Technology C90LE und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Wyse Technology finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Wyse Technology C90LE zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Wyse Technology C90LE, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Wyse Technology C90LE widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Administrators Guide Wyse ® Thin Client s, Based on Microsoft ® Windows ® XP Embedded Products: R90LE, R90L, X90Le, X90L, X90e, X90, C90LE, V90LE, V90L, S90 Issue: 081309 PN: 883808-01 Rev . L[...]

  • Seite 2

    Copyright Notices © 2009, Wyse T echnology Inc. All rights reserved. This manual and the software and firmware described in it are copyrighted. Y ou may not reproduce, transmit, transcribe, store in a retrieval system, or translate into any language or compute r language, in any form or by any means, electronic, mechanical, magnet ic, optica l, ch[...]

  • Seite 3

    Regulatory Complian ce for Thin Client s Basic EMC and Safety Requirements Wyse thin clients are compliant with the regulatory requirements in the regions listed below . U.S.A. - FCC Part 15 (class B) Canada - CAN/CSA-C22 No. 60950 Europe - EN 55022 (class B), EN 61000-3-2 (class A), EN 6100 0-3-3, EN 90650-1:2000+ALL Canadian DOC Notices Class A -[...]

  • Seite 4

    Model Rx0LE Thin Client, Product R90LE For use with External Power Supply Model 0335A1965 or certified equivalent m odel supplied by the manufacturer , output rated 19Vdc, 3.42A. Model SX0 Thin Clien t, Product S90 For use with External Power Supply Model DSA-0421S- 12 3 30, or certified equivalent model supplied by the manufacturer , output rated [...]

  • Seite 5

    Content s Summary of Revisions ix 1 Introduction 1 About this Guide 1 Organization of this Guide 1 Finding the Inform ation Y ou Need in this Guide 2 Wyse T echnical Support 2 Related Online Resources Available at Wyse 2 Wyse Online Community 2 2 Est ablishing a Server Environment 3 Setting-Up Access to the Enterprise Servers 3 Understanding How to[...]

  • Seite 6

    vi Contents Accessing the Extended Fea tures of the Administrator Control Panel 23 Accessing and Using the Admini strative T ools 24 Configuring Component Services 24 Viewing Event s 25 Managing Services 25 Managing Users 26 Configuring WinVNC Current User Proper ties 26 Setting Configuration S trings with Custom Fields 27 Configuring Dual Monitor [...]

  • Seite 7

    Contents vii Using Windows Server Update Se rvices (WSUS) on a Thin Client 59 Configuring the Thin Client for WSUS 59 Automatic Software Updates on Wyse Thin Clients Using WSUS 60 Using WSUS on the Wyse Th in Client in S tandalone Mode 60 T roubleshooting WSUS in S tandalone Mode 61 Windows Update Log File Examples 62 Configuring WSUS for Automati [...]

  • Seite 8

    viii Contents This page intentionally blank.[...]

  • Seite 9

    Summary of Revisions Wyse T echnology Inc. 883808-01 Rev . L The following changes were made to this document since revision K: Wyse T echnology Inc. 883808-01 Rev . K The following changes were made to this document since revision J: Reference Description Model Cx0, Product C90LE New model an d product in formation ad ded to "Dev ice Power Su[...]

  • Seite 10

    x Summary of Revisions "Accessing Thin Client BIOS Settings" Addition of new section to provide instructio ns on accessing the BIOS settings of a thin client. Updated figures and workflow All figures and workflow instructions have been upd ated to include and describe the new user in terface. Reference Description[...]

  • Seite 11

    1 Introduction Wyse ® thin clients running Micro so f t ® Windows ® XP Embe dded provide access to applications, files, and network resources made available on machin es hosting Citrix™ ICA and Microsof t™ RDP session services. The th in client s conta in a full featured Internet Explorer browser and th in client em ulation software, Ericom [...]

  • Seite 12

    2 Chapter 1 Chapter 4, "Getting to Know the Extended Features," cont ains information on the extended fe atures of Wyse thin clients ru nning Microsof t Wind ows XP Embed ded tha t are not found in standard Wind ows XP . Chapter 5, "Administrative Utilit ies and Settings," provides general informati on about the utilities and se[...]

  • Seite 13

    2 Est ablishing a Server Environment This chapter cont ains information on the network architecture and enterprise server environment needed to provide network and session services for Wyse thin clients running Microsoft Windows XP Emb edded. It also in cludes information to help you address important conside ra tions when configuring access to the[...]

  • Seite 14

    4 Chapter 2 • PPTP VPN - PPTP (Point-to-Point T unneling Prot ocol) is a ne twork protocol that enables the secure transfer of data be tween a re mote client (in this case the thin client) and an enter prise server environment by creating a virtual private network (VPN) across TCP/IP-based data networks such as the Intern et. It provides a passwo[...]

  • Seite 15

    Establishing a Server Environment 5 T a ble 1 DH CP Options Option Description Notes 1 Subnet Mask Required. 3 Router Optional but recom m e nd ed . It is not requir ed unless the thin client must interact with servers on a different su bnet. 6 Domain Name Server (DNS) Optional bu t re com m e nd ed . 12 Hostname Optional. 15 Domain Name Optiona l [...]

  • Seite 16

    6 Chapter 2 Using FTP File Servers Windows XP Embedded WFR2 includes an FTP Upgrade utility that c an be used to upgrade the XP Embedded thin clie nt with Addons which are in Microsoft .msi form. This utility allows you to automatica lly or manually upgra de a thin client by downloading MSI packages from a specified FTP server . The MSI p ackages a[...]

  • Seite 17

    Establishing a Server Environment 7 Using DNS Thin clients accept valid DNS na mes registered on a DNS server available to the enterprise intranet. The th in client will quer y a DNS server on the network for name to IP resolution. In most cases DNS is not requir ed but may be used to allow host s to be accessed by their registered DNS names rather[...]

  • Seite 18

    8 Chapter 2 Configuring ICA Session Services Before you use the inform a tio n in th is sect ion to c onfigure your ICA session services, be sure you have read "Underst anding Session Services." ICA session service s can be made availab le on the network using e ither Windows 2000 or 2003 Server with T erminal Services and one of the foll[...]

  • Seite 19

    Establishing a Server Environment 9 Using VMware V iew Manger Services VMware ® View Manager is a desktop man agement solution that enables system administrators to provision desktops and c ontrol user access. Client software securely connects user s to centralized virtual desktop s, back-end physical sy stems, or terminal servers. Note Informatio[...]

  • Seite 20

    10 Chapter 2 This page intentionally blank.[...]

  • Seite 21

    3 Getting S t arted This chapter provides informatio n to help you quickly get started using your thin client. It describes basic thin client function s and provid es instructions on s ett ing up the thin client for you and your users. What Happens When Y ou T urn on Y our Thin Client What you see, initially , when you turn on or re boot a thin cli[...]

  • Seite 22

    12 Chapter 3 Automatic Logon Automatic logon to a User d esktop is enabled on th e thin client by default. If you want to log on as a dif f erent user while Auto Logon is enabled, log off the current desktop while holding down the SHIFT key to display the Log On to W indows dialog box and use your credentials to logon. An administrator can log on a[...]

  • Seite 23

    Getting Started 13 2. After logging on to the thin client, disa ble the Fi le Based Write Filter b y double-clicking the FBWF Disable icon on the desktop (this will di sable the filter and reboot the system). 3. If automatic logon to a User desktop is enabl ed on the thin client, you mu st log off the User desktop and lo g on as an administrator (l[...]

  • Seite 24

    14 Chapter 3 Underst anding th e User Desktop The default User desktop icons include Citrix Pro gram Neighborhood, and Remote Desktop Connection (st andard and S pan). The Star t menu includes Internet Explorer , Control Panel, and Prin te r an d Faxes. The All Programs menu includes Citrix Program Neighborhood, Client Information, Internet Explore[...]

  • Seite 25

    Getting Started 15 Underst anding the Administrator Desktop The default Administrator de sktop icons in clude Citrix Program Neighb orhood, Remote Desktop Connection (st andard and S pan), File Based W rite Filter Disable, and File Based Write Filter Enable.The Sta r t menu includes Internet Exp l orer , My Computer , My Network Places, Control Pan[...]

  • Seite 26

    16 Chapter 3 Logging Off, Shutting Down, and Rest arting Use the Shut Down menu to log of f, shut down, restart, or place the thin client in st and by (all options are available to use by clicking S tart | Shut Down ) . Y ou can also log off or shut down the thin client using the W indows Security windo w (opened by using CTRL+AL T +DEL key combina[...]

  • Seite 27

    4 Getting to Know the Extended Features This chapter contain s information on the extended features of Wyse thin clients r unning Microsoft Windows XP Emb edded that are not found in standar d Windows XP . Configuring and Using Peripherals Depending on the port s available on the thin client, the thin client can provide services through a USB port,[...]

  • Seite 28

    18 Chapter 4 Managing Connections with Citrix Program Neighborhood Cirtix Program Neighb or hood is available to Users and Administrators. Use the Cir tix Program Neighborhood application (available by clicking Citrix Program Neighborhood in the All Programs menu or doub le-clicking the Citrix Program Neighborho od desktop icon) to manage connectio[...]

  • Seite 29

    Getting to K now the Ex tended Feat ures 19 Browsing the Internet with Internet Explorer Microsoft Inte rnet Explorer 7 is availabl e to Users and Administrator s. The browser (available by clicking Internet Explo rer in the All Programs menu) has Inter ne t op tio n settings that have been preselected at the fact ory to limit writing to flash memo[...]

  • Seite 30

    20 Chapter 4 Using the Odyssey Client Manager If purchased and installed, the Odyssey Clie nt Manager is ava ilable to Users and Administrators. Clicking St art | All Programs | Funk Software | Odyssey Client | Odyssey Client M anager (or double-clicking the Odyssey Client Manager icon in the Control Panel or system tray of the Administrator taskba[...]

  • Seite 31

    Getting to K now the Ex tended Feat ures 21 Use the TEC window and the Connect dialog b ox (available by clicking Ericom-PowerT erm T ermina l Emulation | PowerT erm T erminal Emulation in the All Programs menu) to configure your connection info rmation. For complete instructions on insta lling a nd using Ericom – PowerT erm® TEC, refer to the E[...]

  • Seite 32

    22 Chapter 4 Using VMware V iew Client to Connect to a Virtual Desktop VMware View Client is avai lable to Users and Administrators. Use the VMware Vi ew Client dialog box (availa b le by clicking VMware | VMware View Client in the All Programs menu—click >> to open the extend ed menu of the dialog box) to connect to a virtual desktop. Figu[...]

  • Seite 33

    Getting to K now the Ex tended Feat ures 23 Accessing the Extended Features of the Administrator Control Panel This section provides an overview of the ex tended features found in the Administra tor Control Panel (options are available to use by clicking Start | Control Panel ). This section includes information on: • "Accessing and Using th[...]

  • Seite 34

    24 Chapter 4 Accessing and Using th e Administrative T ools Double-clicking the Administrative T ools icon in the Control Panel op ens the Administrative T ools window . Figure 12 Administrative T ools Administrative T ools are available for: • "Configuring Compone nt Services" • "Viewing Event s" • "Managing Services[...]

  • Seite 35

    Getting to K now the Ex tended Feat ures 25 Viewing Event s Double-clicking the Event Viewer icon opens the Event Viewer window . This tool displays monitoring and troubleshooting messages from Windows and other prog rams. Figure 14 Event Viewer Managing Services Double-clicking the Services icon open s the Services window . This window lists the s[...]

  • Seite 36

    26 Chapter 4 Managing Users Double-clicking the User Manager icon opens the Local Users and Group s window . This tool allows adminis tra to rs to manage users and groups. For det ailed information on the User Manager , refer to "Managing Users and Groups with User Manager ." Figure 16 Local Users and Group s Configuring WinVNC Current Us[...]

  • Seite 37

    Getting to K now the Ex tended Feat ures 27 troubleshooting purposes. Fo r information on VNC user settings, refer to "Using WinVNC to Shadow a Thin Client." Note Hovering the mouse poin ter over th e VNC icon on the taskbar show s the current IP address of the thin client. Setting Configuration Strings with Custom Fields Double-clicking [...]

  • Seite 38

    28 Chapter 4 Configuring Dual Monitor Display ( For Dual-Monitor Cap able Thin Client s Only ) Y ou can use the Settings t ab of the Dis play Properties dialog bo x (double- click the Display icon in the Control Panel , and then click the Settings tab) to configure the dual monitor settings as described in the Microsof t documentation at: http://ww[...]

  • Seite 39

    Getting to K now the Ex tended Feat ures 29 Configuring T ouchscreens If the ELO T ouchscreen option is inst alled on the thin client, double-clicking the ELO T ouchscreen icon in the User or Administrator Control Pane l allows you to calibrate and customize the settings for a touchscr een monito r that is connected to (or integrated with) a thin c[...]

  • Seite 40

    30 Chapter 4 Setting Ramdisk Size Ramdisk is volatile memory sp ace used for tempor ary data sto rage. It is the Z drive shown in the My Computer window . It can also be used for temporary storage of other dat a according to adm inist rator discretio n (se e "Saving File s an d Usin g Loca l Drive s") . The following items ar e stored on [...]

  • Seite 41

    Getting to K now the Ex tended Feat ures 31 Selecting Regional and Language Options Double-clicking the Regional and Language Options icon in the Control Pa nel opens the Regional and Language Opt ions dialog box. Use this dialog b ox to select your keyboard language. The following keyb oard languages are supported: Note A language appropriate keyb[...]

  • Seite 42

    32 Chapter 4 Configuring WDM Properties Double-clicking the WDM icon in the Control Pa nel opens the WDM Properties dialog box. Use this dialog box to configure th e WDM settings. Figure 22 WDM Properties Use the following guidelines: 1. Enter the IP address or hostname of the WDM Server . 2. Enter the port to use. 3. Click OK . For information on [...]

  • Seite 43

    Getting to K now the Ex tended Feat ures 33 Configuring Wireless Local Area Network (LAN) Settings If Wyse USB 802 .1 1b hardware is installe d on the thin clien t, double-clicking th e W ireless LAN Settings icon in the Co ntrol Panel allows you to configure wireless LAN settings (such as the wireless network ID, and so on). Note The Wireless LAN [...]

  • Seite 44

    34 Chapter 4 2. Open the Network Connect ions dialog box ( St art | Control Panel | Ne twork Connections ) to view the available network connections. 3. Right-click Wireless Network Connection an d select Properties to open the Wireless Net work Connection Properties dialog box. Figure 25 Wireless Network Connection Propert ie s 4. Select the Wirel[...]

  • Seite 45

    Getting to K now the Ex tended Feat ures 35 3. Click the Association tab. 4. Enter the Network name (SSID). 5. Select the WP A2 option for Network Authentication. 6. Select the AES option for Dat a encryption. 7. Click the Authentication tab. 8. Select the Enable IEEE 802.1x authenti cation for this network check box. 9. Select the Smart Card or ot[...]

  • Seite 46

    36 Chapter 4 Figure 28 Wireless Network Connection - EAP-TLS 3. Select the connection you cr eated in step 4 (the Ne twork name (SSID)), and then click Connect . A wireless connection shou ld now be est ablished. Configuring Wireless Thin Clie nt s for PEAP-MS-CHAP v2 1. Right-click Wireless Network Connection an d select Properties to open the Wir[...]

  • Seite 47

    Getting to K now the Ex tended Feat ures 37 Figure 30 Protected EAP Properties - PEAP-MS-CHAP v2 11 . Clear the V alidate server certificate chec k box. 12. Select the Enable Fast Recon nec t check box. 13. Click Configure to open the EAP MSCHAPv2 Properties dialog box. Figure 31 EAP MSCHAPv2 Properties - PEAP-MS-CHAP v2 14. Clear the Automatically[...]

  • Seite 48

    38 Chapter 4 Figure 32 Enter Credentials - PEAP-MS-CHAP v2 19. Enter the User name, Password and Domain nam e, and then click OK . A wireless connection shou ld now be est ablished. Preserving Wireless Connections Windows XP Embedded WFR2 includes a tool called Regpersistence.e xe whic h is designed to configure wireless access in W rite Filter Ena[...]

  • Seite 49

    Getting to K now the Ex tended Feat ures 39 Note PEAP is available as an authentication method for 802.1 1 wireless clients, but it is not supported for virtual private network (VPN) client s or other remote access client s. Therefore, you can configure PEAP as the authentication method for a remote access policy only when you are using Internet Au[...]

  • Seite 50

    40 Chapter 4 This page intentionally blank.[...]

  • Seite 51

    5 Administrative Utilities and Settings This chapter provides general informatio n about the utilities and settings available for administr ativ e us e. It includes information on: • “Using the File Based Write Filter (FBWF)” • "Understanding the NetXClean Utility" • "Saving Files and Using Local Drives" • "Mapp[...]

  • Seite 52

    42 Chapter 5 Caution Contents of the File Based Write Filter cache should never be flushed if it is eighty-perc ent or more full. The Adm ini strator should periodically check the status of the cache a nd rest art the thin client if the cache is more than eighty percent full. Note A T erminal Services Client Access License (TSCAL) is always preserv[...]

  • Seite 53

    Administrative Ut ilities and Settings 43 Disabling the machine acc ount passwor d change on the thin client T o disable the machine account password change on the thin client: 1. S tart the Re gistry Editor by clicking Start | Ru n , entering regedit in th e Open text box, and then clicking OK . 2. Locate and click the following registry subkey: H[...]

  • Seite 54

    44 Chapter 5 Running File Based Write Fi lter Command Line Options There are several co mmand lines you can use to control the File Based W rite Filter (command line argume nts cannot be combined). Caution Administrators should use NT file security to prevent undesired usag e of these comma nd s. Use the following guidelines fo r the command line o[...]

  • Seite 55

    Administrative Ut ilities and Settings 45 Enabling and Disabling the File Based Write Filter Using the Desktop Icons For convenience, the File Based Write Filter Enable and Disable icons a re present on the Administrator desktop. Use these icons to enab le or disable the File Based Write Filter . • File Based Write Filter Enable Icon - Double-cli[...]

  • Seite 56

    46 Chapter 5 • RAM used by FBWF - Shows the amount of RAM used (in Kilobytes and Percentage) that is currently bein g used by t he File Based Write Filter . If Current Stat us is Disabled, RAM Used by FBWF is always zero (0). • Enable FBWF - Allows you to enable the File Based Write Filte r and prompts you to restart the thin client. If you do [...]

  • Seite 57

    Administrative Ut ilities and Settings 47 Underst anding the NetXClean Utility NetXClean keep s extraneous information from being stored in fla sh memory . NetXClean is a service th at runs in t he backgrou nd. NetXCle an clean-up is triggere d by either a service startup or a user log-off. It performs the cle an- up invisibly and no user input is [...]

  • Seite 58

    48 Chapter 5 Saving Files and Using Local Drives Administrators need to know the following information ab out local drives and saving files. Saving Files Thin clients use an em bedded operating system with a fix ed amount of flash memory . It is recommended that you save files you want to k eep on a ser ver r ather than on a thin client. Caution Be[...]

  • Seite 59

    Administrative Ut ilities and Settings 49 Mapping Network Drives Users and ad ministrators can map netw ork drives. Ho wever , to retain the ma ppings after the thin client is restarted, you must comple te the following: • Select the Reconne ct a t logon check box. • Flush the files of the File Based Write Filter cache dur ing the current syste[...]

  • Seite 60

    50 Chapter 5 Using Roaming Profiles Y ou can p articipa te in domains by writing roaming pr ofiles to the C drive. The profiles must be limited in size and will not be retained when the thin client is restarted. Note For success ful downloadin g and prop er functioning , there mu st be sufficient flash space available for roaming profiles. In some [...]

  • Seite 61

    Administrative Ut ilities and Settings 51 Managing Users and Grou p s with User Manager The User Manager allows administrators to create new user accounts and configure user profiles. It also allows administrators to create new gro up s and determine group membership. By default, a new user is only a member of the Users group and is not locked down[...]

  • Seite 62

    52 Chapter 5 Configuring User Profiles Only administrators can select the profile settings for a user . Caution Because of the limited size of th e fl ash memory , it is strongly recommended that other applications av ailable to new and ex isting users b e configured to prevent writing to the local file syst em. For the same re ason, it is also rec[...]

  • Seite 63

    Administrative Ut ilities and Settings 53 Determining Group Membership Use the followin g guidelines (example of a dding a us er to the Adm inistrator gr oup): Caution Be sure to flush the files of the File Based W rite Filter cache during the current system sessio n in which an account is modified. 1. Log-in as an administra tor and open the User [...]

  • Seite 64

    54 Chapter 5 This page intentionally blank.[...]

  • Seite 65

    6 System Administration This chapter contains local and remote system administration information to he lp you perform the routine t asks needed to mainta in your W yse thin client environment. It includes: • "Using Wyse Device Manager Sof tware for Remote Administration" • "Accessing Thin Client BIOS Settings" • "Inst[...]

  • Seite 66

    56 Chapter 6 Inst alling and Up grading Addons T o install or upgrade Addons, it is recommended that you use WDM (the thin client has a built-in WDM Ag ent for us e as descri bed in "Configuring WDM Properties"). Note For more informa tion on Wyse Device Manager softwar e refer to the Wyse Web site at: http://www .wyse.c om/products/soft [...]

  • Seite 67

    System Administration 57 2. Depending on whether you select Manu al FTP Information or Use DHCP Server’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the path to the MSI p ackage that inst alls the Addon (the MSI package on the FTP server mu st be accom[...]

  • Seite 68

    58 Chapter 6 2. Depending on whether you select Manu al FTP Information or Use DHCP Server’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the path to the MSI p ackage that inst alls the Addon (the MSI package on the FTP server mu st be accompanied by a [...]

  • Seite 69

    System Administration 59 Uninst alling Addons Using the FTP Addon Installer Y ou can use the FTP Addon Inst aller dialog box to uninstall the thin client Addons th at have been installe d with the FTP Addons utility . Use the following guidelines: 1. Log-in as an administra tor and open the FTP Addo n Ins taller dialog box ( Star t | Control Panel [...]

  • Seite 70

    60 Chapter 6 Automatic Sof tware Updates on W yse T hin Clients Using WSUS This section describes three ways to automati cally deploy software upd ates on thin clients using WSUS: • "Using WSUS on the Wyse Thin Client in S tandalone Mode " • "Configuring WSUS for Automatic Software Updates Using SMS" • "Using WSUS wit[...]

  • Seite 71

    System Administration 61 T roubleshooting WSUS in St andalone Mode WSUS provides a log for trouble shooting issues related to software updates. This log is located on the thin clie nt, in the directory: C:windowswindows update log . This log displays all commun ications betwee n the client and the server. Y ou can use PERF MON to monitor memory a[...]

  • Seite 72

    62 Chapter 6 Windows Up date Log File Examples The examples below illustrate the lo g files for selected activities. Service S tartup 2005-06-01 18:30:03 992 810 Service ************* 2005-06-01 18:30:03 992 810 Service ** START ** Service: Service startup 2005-06-01 18:30:03 992 810 Service ********* The Windows Up date agent searc hes for availab[...]

  • Seite 73

    System Administration 63 Configuring WSUS for Automati c Sof tware Up dates Using SMS Y ou can configure WSUS to use the SMS se rver to perform automatic sof tware updates in either a W orkgroup environment or using Active Directory . Prerequisite s Before any software up dates can be deployed via WSUS, you must: • Install SMS 2003 or SMS 2007 on[...]

  • Seite 74

    64 Chapter 6 Using WSUS with WDM Y ou can use WDM to deploy the scr ipt that dis ables the W rite Filter , a nd then configure the thin client to contact the WSUS serve r for software upd ates. Prerequisite s Before any software up dates can be deployed via WSUS, you must: • Install and configu re WDM on the server • Install WSUS Serve r v . 2.[...]

  • Seite 75

    System Administration 65 Figure 38 WSUS 3.0 Management Console 4. When the software update s ar e co mple te, use WDM to schedule th e scr ipt that enables the Write Filter to run on the thin client. T roubleshooting WSUS with WDM Y ou can use the steps describe d in the “T roubleshooting WSUS in S tandalone Mode” section to troubleshoot the is[...]

  • Seite 76

    66 Chapter 6 close the DOS window that is present durin g the process; the DOS window will close automatically . Event: The System Settings Change messag e may appear shortly after the first b oot, depending on the specific hardware configur ation of the thin client. • The New Hardware Found message displays in the system tray (lower ri ght hand [...]

  • Seite 77

    System Administration 67 Figure 40 WinVNC: Current User Properties Before a remote machine (o n which VNC Viewer is inst alled) can ac cess a thin client: • The IP address (or valid DNS name) of the thin client that is to be operated/mon itored must be known by the remo te administrator/user . T his IP address can be obtained from the Details are[...]

  • Seite 78

    68 Chapter 6 2. (Optional) Y ou can configure advanced VNC co nnection options using the Connection Options dialog box. For example, if the network is slow , click Options to open the Connection Options dialog box, select the Restrict Pixels to 8- bit check box in the Display area (reduces color depth for bette r tr ansm issio n spee d), a nd then [...]

  • Seite 79

    System Administration 69 3. In the VNC Server box of the Connection Details dialog box, enter the IP address or valid DNS name of the thin client that is to be operated/monitored followed by a colon and 0. For example: snoopy:0 or 132.237.16.238:0 4. Click OK to open the VNC Authentication dial og box. Figure 43 VNC Authentication 5. Enter the Sess[...]

  • Seite 80

    70 Chapter 6 This page intentionally blank.[...]

  • Seite 81

    Figures 1 User deskto p - example 14 2 Administrator desktop - example 15 3 Citrix Program Ne ighborhood 18 4 Internet Explorer 19 5 Remote Desktop Conne ction - expanded view example 19 6 Odyssey Client Manager 20 7 Ericom – PowerTer m® Session Manager 20 8 Ericom – PowerTer m® TEC and Connect 21 9 Neutron - exte nded view 21 10 VMware View [...]

  • Seite 82

    72[...]

  • Seite 83

    73 Ta b l e s 1 DHCP Options 5 2 WSUS Log Format 61 3 WSUS Component s 61[...]

  • Seite 84

    Administrators Guide Wys e ® Thin Clients , Based on Microsof t ® Windows ® XP Embedded Issue: 0813 0 9 Written and publishe d by: Wyse T e chnology Inc., August 2009 Created using Fra m eM a ke r ® and Acrobat ®[...]